From Polipo's site:
- "Polipo is a small and fast caching web proxy (a web cache, an HTTP proxy, a proxy server). While Polipo was designed to be used by one person or a small group of people, there is nothing that prevents it from being used by a larger group."
Unlike Squid, Polipo is very light on resources and simple to configure. This makes it ideal for single user systems and other uncomplicated setups. Do keep in mind; however, that this versatility comes at a cost; Polipo will increase its space usage without restriction as it is not aware of how big its disk cache grows. This perceived fault is by design, since omitting these sanity checks drastically reduces Polipo's memory usage and overall toll on the system. A practical way of restricting disk usage is by making Polipo run as its own user and employing disk quota.
The following covers installing and setting up Polipo.
Alternatively, install the newer development branch polipo-git instead.
The current Polipo package is missing a set of features users might find desirable, namely: proper daemon behavior, including placing files in Template:Filename and a call to cleanse Polipo's cache; a cronjob that routinely performs the latter; and finally, a restricted "polipo" user to address security and maintainability concerns.
To partially fix these issues, replace the daemon script with the following: Template:File
And save the cron file in Template:Filename:
#!/bin/sh /etc/rc.d/polipo purge >/dev/null 2>&1
Make it executable:
# chmod +x /etc/cron.weekly/polipo
Run Polipo as designated user
Polipo should run as an unpriviledged user. Such a user can either be created or reused. A good choice for reuse is "nobody", which is the default choice of tinyproxy.
While tinyproxy starts as root and drops priviledges as soon as possible, polipo runs as the user that invoked it. If polipo is invoked from Template:Filename, it can run as nobody by changing the invokation line from
/usr/bin/$DAEMON $ARGS >/dev/null 2>&1
sudo -u nobody /usr/bin/$DAEMON $ARGS >/dev/null 2>&1
It is then also necessary to change ownership of several files and directories written by polipo:
- the log file Template:Filename. Although a better choice is to create a directory Template:Filename owned by the designated user and set polipo's log file to Template:Filename via the logFile variable in the config file.
- the pid file at Template:Filename
- the cache under Template:Filename
Starting the daemon
To start the Polipo daemon:
# /etc/rc.d/polipo start
Add it to Template:Filename to start it automatically at boot:
DAEMONS=(syslog-ng network netfs polipo crond)
Polipo can also run without super user privileges. To do so, first copy Template:Filename to a suitable directory:
$ cp /etc/polipo/config.sample ~/.poliporc
Edit it so that it points at a writable location, instead of Template:Filename:
# Uncomment this if you want to put the on-disk cache in a # non-standard location: diskCacheRoot = "~/.polipo-cache/"
Create the cache directory:
$ mkdir ~/.polipo-cache
Finally, launch Polipo with the new configuration:
$ polipo -c ~/.poliporc
Management is mostly performed in Template:Filename. Most users can opt for using the sample configuration file, which is sufficient for most situations and well documented.
# cd /etc/polipo; cp config.sample config
Unlike other proxies, Polipo needs to be restarted after alterations.
Set the browser so that it uses Template:Codeline for proxying. Be sure to disable the browser's disk cache to avoid redundant IO operations and bad performance.
Instead of manually configuring each browser or other utilities that might benefit from Polipo's caching, one can also use iptables to route traffic through polipo.
After installing iptables, add the appropiate rules to Template:Filename:
*nat :PREROUTING ACCEPT [0:0] :POSTROUTING ACCEPT [0:0] :OUTPUT ACCEPT [0:0] -A OUTPUT -p tcp --dport 80 -m owner --uid-owner polipo -j ACCEPT -A OUTPUT -p tcp --dport 80 -j REDIRECT --to-ports 8123 COMMIT
This routes HTTP traffic through Polipo. Remove all proxy settings from browsers, if any, and restart iptables.
Privoxy is a proxy useful for intercepting advertisement and other undesirables.
According to Polipo's developer, in order to get the privacy enhancements of Privoxy and much (but not all) of the performance of Polipo, one should place Polipo upstream of Privoxy.
In other words:
- point the browser at Privoxy: Template:Codeline
- and direct Privoxy traffic to Polipo: Template:Codeline in the Privoxy configuration file.
Tor is an anonymizing proxy network.
To use Polipo with Tor, uncomment or include the following in Template:Codeline:
socksParentProxy = localhost:9050 socksProxyType = socks5
DansGuardian is a web content filter. The only difference to using DansGuardian with Polipo (rather than squid or tinyproxy) is that in Template:Filename the proxyport needs to be set to polipo's 8123:
# the port DansGuardian connects to proxy on proxyport = 8123